Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Injecting Malicious Code Into HTML5-Based Apps

10.04.2014

Scanning 2D barcodes, finding free Wi-Fi access points, sending SMS messages, listening to music, and watching MP4 videos: these are very common activities that we do using our smartphones.

Can you imagine that simply doing these things can get your smarphones infected with "worms" that can not only steal personal information from your phone, but also infect your friends's phones.

Sound scary? It will not be long before worms like this spread among smartphones. What makes the attacks feasible is an emerging technology called HTML5-based app development, and it has been rapidly gaining popularity in the mobile industry.

When the adoption of this technology reaches certain threshold, attacks like this will become quite common, unless we do something to stop it. A recent Gartner report says that by 2016, fifty percent of the mobile apps will be using HTML5-based technologies.

What platforms are affected?

All major mobile systems will be affected, including Android, iOS, Blackberry, Windows Phone, etc., because they all support HTML5-based mobile apps.

A notorious problem of the HTML5-based technology is that malicious code can be easily injected into the program and get executed. That is why the Cross-Site Scripting (XSS) attack is still one of the most common attacks in the Web.

XSS attacks can only target at web applications through a single channel (i.e. the Internet), but with the adoption of the same technology in mobile devices, we have found out that a similar type of attack can not only be launched against mobile apps, it can attack from many channels, including 2D barcode, Wi-Fi scanning, Bluetooth pairing, MP3 songs, MP4 videos, SMS messages, NFC tags, Contact list, etc. As long as an HTML5-based app displays information obtained from outside or from anohter app, it may be a potential victim.

Chris Hittinger | EurekAlert!
Further information:
http://www.cis.syr.edu/~wedu/attack/

More articles from Information Technology:

nachricht NIST's Cloud Computing Roadmap details research requirements and action plans
23.10.2014 | National Institute of Standards and Technology (NIST)

nachricht UMD researchers formulate cyber protection for supply chains
22.10.2014 | University of Maryland

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Anzeige

Anzeige

Event News

Comparing Apples and Oranges? A Colloquium on International Comparative Urban Research

22.10.2014 | Event News

Battery Conference April 2015 in Aachen

16.10.2014 | Event News

Experts discuss new developments in the field of stem cell research and cell therapy

10.10.2014 | Event News

 
Latest News

Precise and programmable biological circuits

24.10.2014 | Life Sciences

Desert Streams: Deceptively Simple

24.10.2014 | Earth Sciences

Modernized stainless steel continuous caster from Siemens goes on stream at Posco

24.10.2014 | Press release

VideoLinks
B2B-VideoLinks
More VideoLinks >>>